default search action
Ruggero Lanotte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Vittoria Cozza, Mila Dalla Preda, Ruggero Lanotte, Marco Lucchese, Massimo Merro, Nicola Zannone:
Obfuscation strategies for industrial control systems. Int. J. Crit. Infrastructure Prot. 47: 100717 (2024) - [j30]Valentina Castiglioni, Ruggero Lanotte, Simone Tini:
Back to the format: A survey on SOS for probabilistic processes. J. Log. Algebraic Methods Program. 137: 100929 (2024) - [c46]Valentina Castiglioni, Ruggero Lanotte, Michele Loreti, Simone Tini:
Evaluating the Effectiveness of Digital Twins Through Statistical Model Checking with Feedback and Perturbations. FMICS 2024: 21-39 - [i11]Jian Xiang, Ruggero Lanotte, Simone Tini, Stephen Chong, Massimo Merro:
Measuring Robustness in Cyber-Physical Systems under Sensor Attacks. CoRR abs/2403.05829 (2024) - 2023
- [j29]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
Industrial Control Systems Security via Runtime Enforcement. ACM Trans. Priv. Secur. 26(1): 4:1-4:41 (2023) - [c45]Ruggero Lanotte, Massimo Merro, Nicola Zannone:
Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study. FORTE 2023: 75-94 - [c44]Stephen Chong, Ruggero Lanotte, Massimo Merro, Simone Tini, Jian Xiang:
Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems. HSCC 2023: 20:1-20:12 - [c43]Ruggero Lanotte, Desiree Manicardi, Simone Tini:
Step-by-step Robustness for Biochemical Networks. ICTCS 2023: 299-313 - 2022
- [c42]Mariano Ceccato, Youssef Driouich, Ruggero Lanotte, Marco Lucchese, Massimo Merro:
Towards Reverse Engineering of Industrial Physical Processes. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 273-290 - 2021
- [j28]Ruggero Lanotte, Massimo Merro, Simone Tini:
A probabilistic calculus of cyber-physical systems. Inf. Comput. 279: 104618 (2021) - [j27]Ruggero Lanotte, Simone Tini:
A weak semantic approach to bisimulation metrics in models with nondeterminism and continuous state spaces. Theor. Comput. Sci. 869: 29-61 (2021) - [j26]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
A process calculus approach to detection and mitigation of PLC malware. Theor. Comput. Sci. 890: 125-146 (2021) - [c41]Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Simone Tini:
Formal Impact Metrics for Cyber-physical Attacks. CSF 2021: 1-16 - [i10]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
Runtime Enforcement of Programmable Logic Controllers. CoRR abs/2105.10668 (2021) - 2020
- [j25]Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò:
A Formal Approach to Physics-based Attacks in Cyber-physical Systems. ACM Trans. Priv. Secur. 23(1): 3:1-3:41 (2020) - [c40]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
Runtime Enforcement for Control System Security. CSF 2020: 246-261 - [c39]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
A Process Calculus Approach to Correctness Enforcement of PLCs. ICTCS 2020: 81-94 - [i9]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
A process calculus approach to correctness enforcement of PLCs (full version). CoRR abs/2007.09399 (2020)
2010 – 2019
- 2019
- [c38]Valentina Castiglioni, Ruggero Lanotte, Simone Tini:
Fully Syntactic Uniform Continuity Formats for Bisimulation Metrics. The Art of Modelling Computational Systems 2019: 293-312 - [c37]Ruggero Lanotte, Massimo Merro, Fabio Mogavero:
On the decidability of linear bounded periodic cyber-physical systems. HSCC 2019: 87-98 - [c36]Ruggero Lanotte, Simone Tini:
Computing Bisimilarity Metrics for Probabilistic Timed Automata. IFM 2019: 303-321 - [i8]Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò:
A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems (Extended Version). CoRR abs/1902.04572 (2019) - 2018
- [j24]Ruggero Lanotte, Massimo Merro:
A semantic theory of the Internet of Things. Inf. Comput. 259(1): 72-101 (2018) - [j23]Ruggero Lanotte, Massimo Merro, Simone Tini:
Equational Reasonings in Wireless Network Gossip Protocols. Log. Methods Comput. Sci. 14(3) (2018) - [c35]Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
A Modest Security Analysis of Cyber-Physical Systems: A Case Study. FORTE 2018: 58-78 - [c34]Ruggero Lanotte, Simone Tini:
Weak Bisimulation Metrics in Models with Nondeterminism and Continuous State Spaces. ICTAC 2018: 292-312 - [c33]Ruggero Lanotte, Massimo Merro, Simone Tini:
Towards a Formal Notion of Impact Metric for Cyber-Physical Attacks. IFM 2018: 296-315 - [i7]Ruggero Lanotte, Massimo Merro, Simone Tini:
Towards a formal notion of impact metric for cyber-physical attacks (full version). CoRR abs/1806.10463 (2018) - 2017
- [c32]Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò:
A Formal Approach to Cyber-Physical Attacks. CSF 2017: 436-450 - [c31]Ruggero Lanotte, Massimo Merro, Simone Tini:
Weak Simulation Quasimetric in a Gossip Scenario. FORTE 2017: 139-155 - [c30]Ruggero Lanotte, Massimo Merro:
A Calculus of Cyber-Physical Systems. LATA 2017: 115-127 - [c29]Ruggero Lanotte, Massimo Merro, Simone Tini:
Compositional Weak Metrics for Group Key Update. MFCS 2017: 72:1-72:16 - [i6]Ruggero Lanotte, Massimo Merro, Simone Tini:
A Probabilistic Calculus of Cyber-Physical Systems. CoRR abs/1707.02279 (2017) - [i5]Ruggero Lanotte, Massimo Merro, Simone Tini:
Equational Reasonings in Wireless Network Gossip Protocols. CoRR abs/1707.03215 (2017) - 2016
- [j22]Valentina Castiglioni, Ruggero Lanotte, Simone Tini:
A Function Elimination Method for Checking Satisfiability of Arithmetical Logics. Fundam. Informaticae 143(1-2): 51-71 (2016) - [c28]Ruggero Lanotte, Massimo Merro:
A Semantic Theory of the Internet of Things - (Extended Abstract). COORDINATION 2016: 157-174 - [c27]Ruggero Lanotte, Simone Tini:
Extending Taylor Approximation to Hybrid Systems with Integrals. CS&P 2016: 141-152 - [i4]Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò:
A Formal Approach to Cyber-Physical Attacks. CoRR abs/1611.01377 (2016) - [i3]Ruggero Lanotte, Massimo Merro:
A Calculus of Cyber-Physical Systems. CoRR abs/1612.00484 (2016) - 2015
- [i2]Valentina Castiglioni, Ruggero Lanotte, Massimo Merro:
A Semantic Theory for the Internet of Things. CoRR abs/1510.04854 (2015) - 2014
- [j21]Valentina Castiglioni, Ruggero Lanotte, Simone Tini:
A Specification Format for Rooted Branching Bisimulation. Fundam. Informaticae 135(4): 355-369 (2014) - [c26]Valentina Castiglioni, Ruggero Lanotte, Simone Tini:
A Function Elimination Method for Checking Satisfiability of Arithmetical Logics. CS&P 2014: 46-57 - 2013
- [j20]Danièle Beauquier, Joëlle Cohen, Ruggero Lanotte:
Security policies enforcement using finite and pushdown edit automata. Int. J. Inf. Sec. 12(4): 319-336 (2013) - [c25]Valentina Castiglioni, Ruggero Lanotte, Simone Tini:
A Rule Format for Rooted Branching Bisimulation. CS&P 2013: 49-60 - 2012
- [j19]Catalin Dima, Ruggero Lanotte:
A study on shuffle, stopwatches and independently evolving clocks. Distributed Comput. 25(1): 5-33 (2012) - 2011
- [c24]Ruggero Lanotte, Massimo Merro:
Semantic Analysis of Gossip Protocols for Wireless Sensor Networks. CONCUR 2011: 156-170 - [c23]Laura Bozzelli, Ruggero Lanotte:
Hybrid and First-Order Complete Extensions of CaRet. TABLEAUX 2011: 58-72 - 2010
- [j18]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Reachability results for timed automata with unbounded data structures. Acta Informatica 47(5-6): 279-311 (2010) - [j17]Laura Bozzelli, Ruggero Lanotte:
Complexity and succinctness issues for linear-time hybrid logics. Theor. Comput. Sci. 411(2): 454-469 (2010) - [j16]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Weak bisimulation for Probabilistic Timed Automata. Theor. Comput. Sci. 411(50): 4291-4322 (2010) - [j15]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Time and Probability-Based Information Flow Analysis. IEEE Trans. Software Eng. 36(5): 719-734 (2010)
2000 – 2009
- 2009
- [j14]Ruggero Lanotte, Danièle Beauquier:
A Decidable Probability Logic for Timed Probabilistic Systems. Fundam. Informaticae 96(1-2): 127-151 (2009) - [j13]Ruggero Lanotte, Simone Tini:
Probabilistic bisimulation as a congruence. ACM Trans. Comput. Log. 10(2): 9:1-9:48 (2009) - [c22]Catalin Dima, Ruggero Lanotte:
Removing All Silent Transitions from Timed Automata. FORMATS 2009: 118-132 - 2008
- [j12]Ruggero Lanotte, Andrea Maggiolo-Schettini, Paolo Milazzo, Angelo Troina:
Design and verification of long-running transactions in a timed framework. Sci. Comput. Program. 73(2-3): 76-94 (2008) - [c21]Laura Bozzelli, Ruggero Lanotte:
Complexity and Succinctness Issues for Linear-Time Hybrid Logics. JELIA 2008: 48-61 - [c20]Danièle Beauquier, Joëlle Cohen, Ruggero Lanotte:
Security Policies Enforcement Using Finite Edit Automata. ICE@ICALP 2008: 19-35 - 2007
- [j11]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Parametric probabilistic transition systems for system design and analysis. Formal Aspects Comput. 19(1): 93-109 (2007) - [j10]Ruggero Lanotte, Simone Tini:
Taylor approximation for hybrid systems. Inf. Comput. 205(11): 1575-1607 (2007) - [j9]Ruggero Lanotte:
Expressive Power of Hybrid Systems with Real Variables, Integer Variables and Arrays. J. Autom. Lang. Comb. 12(3): 373-405 (2007) - [c19]Catalin Dima, Ruggero Lanotte:
Distributed Time-Asynchronous Automata. ICTAC 2007: 185-200 - 2006
- [c18]Ruggero Lanotte, Andrea Maggiolo-Schettini, Paolo Milazzo, Angelo Troina:
Modeling Long-Running Transactions with Communicating Hierarchical Timed Automata. FMOODS 2006: 108-122 - [c17]Danièle Beauquier, Ruggero Lanotte:
Hiding Information in Multi Level Security Systems. Formal Aspects in Security and Trust 2006: 250-269 - 2005
- [j8]Ruggero Lanotte, Andrea Maggiolo-Schettini:
Monotonic hybrid systems. J. Comput. Syst. Sci. 71(1): 34-69 (2005) - [c16]Ruggero Lanotte, Simone Tini:
Probabilistic Congruence for Semistochastic Generative Processes. FoSSaCS 2005: 63-78 - [c15]Ruggero Lanotte, Simone Tini:
Taylor Approximation for Hybrid Systems. HSCC 2005: 402-416 - [c14]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Timed Automata with Data Structures for Distributed Systems Design and Analysis. SEFM 2005: 44-53 - [c13]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
A Classification of Time and/or Probability Dependent Security Properties. QAPL 2005: 177-193 - 2004
- [j7]Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci:
Automated analysis of timed security: a case study on web privacy. Int. J. Inf. Sec. 2(3-4): 168-186 (2004) - [j6]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini:
Epsilon-transitions in Concurrent Timed Automata. Inf. Process. Lett. 89(1): 1-7 (2004) - [j5]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini:
Information flow in hybrid systems. ACM Trans. Embed. Comput. Syst. 3(4): 760-799 (2004) - [c12]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:
Automatic Covert Channel Analysis of a Multilevel Secure Component. ICICS 2004: 249-261 - [c11]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Information Flow Analysis for Probabilistic Timed Automata. Formal Aspects in Security and Trust 2004: 13-26 - [c10]Ruggero Lanotte, Andrea Maggiolo-Schettini, Adriano Peron:
Structural Model Checking for Communicating Hierarchical Machines. MFCS 2004: 525-536 - [c9]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Decidability Results for Parametric Probabilistic Transition Systems with an Application to Security. SEFM 2004: 114-121 - [c8]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Automatic Analysis of a Non-Repudiation Protocol. QAPL 2004: 113-129 - [i1]Ruggero Lanotte, Danièle Beauquier:
A Decidable Probability Logic for Timed Probabilistic Systems. CoRR cs.LO/0411100 (2004) - 2003
- [b1]Ruggero Lanotte:
An automaton-theoretic approach to safety and security in real-time systems. University of Pisa, Italy, 2003 - [j4]Ruggero Lanotte, Andrea Maggiolo-Schettini, Adriano Peron, Simone Tini:
Dynamic Hierarchical Machines. Fundam. Informaticae 54(2-3): 237-252 (2003) - [j3]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini:
Concurrency in timed automata. Theor. Comput. Sci. 309(1-3): 503-527 (2003) - [c7]Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Weak Bisimulation for Probabilistic Timed Automata and Applications to Security. SEFM 2003: 34-43 - [c6]Ruggero Lanotte:
Expressive Power of Hybrid Systems with Variables, Parameters and Arrays. EXPRESS 2003: 91-112 - [c5]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:
Automatic Analysis of the NRL Pump. MEFISTO 2003: 245-266 - 2001
- [j2]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Adriano Peron:
Transformations of Timed Cooperating Automata. Fundam. Informaticae 47(3-4): 271-282 (2001) - [c4]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini:
Concurrency in Timed Automata. FCT 2001: 240-251 - [c3]Riccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci:
Formal Models of Timing Attacks on Web Privacy. TOSCA 2001: 229-243 - [c2]Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini:
Privacy in Real-Time Systems. MTCS 2001: 295-305 - 2000
- [j1]Ruggero Lanotte, Andrea Maggiolo-Schettini, Adriano Peron:
Timed Cooperating Automata. Fundam. Informaticae 43(1-4): 153-173 (2000) - [c1]Ruggero Lanotte, Andrea Maggiolo-Schettini:
Timed Automata with Monotonic Activities. MFCS 2000: 518-527
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint